Ubuntu 20.04 LTS / 22.04 LTS : Linux kernel kmsbd multiple vulnerabilities

critical Nessus Plugin ID 169894

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 20.04 LTS / 22.04 LTS host is running a ksmbd server that is affected by multiple vulnerabilities:

- An unauthenticated remote code execution vulnerability in the ksmbd component of the Linux kernel.
(CVE-2022-47939)

- An authenticated remote code execution vulnerability in the ksmbd component of the Linux kernel.
(CVE-2022-47942)

- An unauthenticated remote denial of service vulnerability in the ksmbd component of the Linux kernel. (CVE-2022-47941)

- Authenticated denial of service vulnerabilities in the ksmbd component of the Linux kernel.
(CVE-2022-47938, CVE-2022-47940)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel package.

See Also

https://ubuntu.com/security/CVE-2022-47939

https://www.openwall.com/lists/oss-security/2022/12/23/10

Plugin Details

Severity: Critical

ID: 169894

File Name: ubuntu_ksmbd_cve-2022-47939.nasl

Version: 1.2

Type: local

Agent: unix

Published: 1/11/2023

Updated: 1/12/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-47939

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-53-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-64k, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-53-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1018-ibm, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-53-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1020-gke, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1022-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop, p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1021-kvm, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1023-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-53-generic-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-gke, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1008-gkeop, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1022-oracle, p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-64k, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-53-lowlatency-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-ibm

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release, installed_sw/Linux SMB3 Kernel Server (KSMBD)

Exploit Ease: No known exploits are available

Patch Publication Date: 11/17/2022

Vulnerability Publication Date: 12/22/2022

Reference Information

CVE: CVE-2022-47938, CVE-2022-47939, CVE-2022-47940, CVE-2022-47941, CVE-2022-47942